FAQ
FAQ - Frequently asked questions
No, major updates are not part of this service. However, we can offer you a personal and non-binding quotation for such an update that would ensure that your website is always secure and up-to-date.
The price can vary greatly and depends on the core functions involved and third-party extensions.
Is there a bulk discount for monitoring multiple TYPO3 instances?
No, we cannot offer a bulk discount for monitoring multiple TYPO3 instances, as our prices have been calculated to reflect the best price / performance ratio.
A minor update may include minor features but also bug fixes. The functionality of the system may change. A minor update can be recognized by the fact that the second digit of the version number changes, for example from 8.7.0 to 8.8.0.
We do not carry out minor updates because it means that the LTS for TYPO3 will expire. We only carry out security updates and major updates, if requested.
Security updates are updates which deal with errors in system behavior and security gaps only. Usually a security update does not change the functionality of a system - unless necessary to close any critical security gaps. A security update changes the third digit of the version number, e.g. 9.5.7 to 9.5.8
A breaking change is a change in functionality or behavior of software / an extension between two versions.
An LTS (Long Term Support) is a software version that is supplied with security updates over a longer period of time. These security updates are a convenient way of protecting software without changing or impairing functionality.
An SLA is a service level agreement, i.e. a type of framework contract between client and service provider for recurring services, such as our monitoring and update service for TYPO3.
Phishing is the criminal attempt by a hacker to crack passwords or obtain access using fake emails or SMS. Often stolen user data is used which is processed automatically.
Spam (or junk) are unsolicited mass emails that usually contain advertising or phishing attempts. The spammers often get hold of recipient email addresses via hacked websites or email address crawlers.